Sciweavers

14382 search results - page 2601 / 2877
» Time in Connectionist Models
Sort
View
NDSS
2008
IEEE
15 years 10 months ago
Halo: High-Assurance Locate for Distributed Hash Tables
We study the problem of reliably searching for resources in untrusted peer-to-peer networks, where a significant portion of the participating network nodes may act maliciously to...
Apu Kapadia, Nikos Triandopoulos
PIMRC
2008
IEEE
15 years 10 months ago
Active Highways (Position Paper)
—Highways are an essential component of our society because they are critical to quality of life and to local and national economies. Under good conditions, highways provide a sa...
Liviu Iftode, Stephen Smaldone, Mario Gerla, James...
SECON
2008
IEEE
15 years 10 months ago
Optimal Buffer Management Policies for Delay Tolerant Networks
—Delay Tolerant Networks are wireless networks where disconnections may occur frequently due to propagation phenomena, node mobility, and power outages. Propagation delays may al...
Amir Krifa, Chadi Barakat, Thrasyvoulos Spyropoulo...
CGO
2007
IEEE
15 years 10 months ago
Persistent Code Caching: Exploiting Code Reuse Across Executions and Applications
Run-time compilation systems are challenged with the task of translating a program’s instruction stream while maintaining low overhead. While software managed code caches are ut...
Vijay Janapa Reddi, Dan Connors, Robert Cohn, Mich...
COMSWARE
2007
IEEE
15 years 10 months ago
Situation-Aware Software Engineering for Sensor Networks
—Sensor networks represent a new frontier in technology that holds the promise of unprecedented levels of autonomy in the execution of complex dynamic missions by harnessing the ...
Vir V. Phoha, Shashi Phoha
« Prev « First page 2601 / 2877 Last » Next »